With the advent of technology in personal healthcare - internet connected glucose monitors, intravenous blood pressure monitoring, personal best friend emotional bots - a lot of highly sensitive data that's rampantly traversing the airwaves. The impact of this data getting in the wrong hands is just starting to be...

Transport Layer Security (TLS), if implemented correctly, can ensure that no third party will tamper with a sensitive email message. The Challenge? Mandatory TLS is cumbersome, costly, and time consuming. Opportunistic TLS cannot ensure the sensitive email is actually sent securely. Read more in our e-Book about the...

Dark web vendors offer a wide range of technological crime. From distributed denial of service attacks to pre-recorded phone calls, there is a myriad of knowledge and listings for hacking & exploits.
This report aims to bring a more rigorous and scientific approach to analyzing content on the dark web.
Download...

Today, email is a critical component of any business and must be protected with proper security. Microsoft has become the vendor of choice for email, but many customers find the security capabilities provided do not meet their full requirements. Zix provides a broad portfolio of email security solutions that can be...

Not all email encryption solutions are created equal. Modern email encryption solutions balance security with ease-of-use eliminating barriers that would cause senders and recipients to jump through hoops.
Download this eBook to learn more about:
Consequences of difficult to use email encryption...

Email is the most used communication tool in the business and the vulnerabilities of email should not be overlooked. Implementing the right email encryption solution can be an easy way to secure sensitive corporate data, avoid breach costs and meet regulatory obligations.
Download this eBook to discover:
The...

A recently published 2017 survey of over 400 security professionals in the U.S., U.K. and Germany measured how well their organizations implemented security controls for SSH keys. The results show that most organizations are underprepared to protect against SSH-based attacks, with fewer than half following industry...

The crypto community has been trying to prepare for the transition to "quantum-resistant" algorithms - that is, algorithms that are secure against an attack by a quantum computer.
Download this whitepaper and learn:
The difference between quantum computing versus quantum encryption;
What the current quantum...

With roughly six months to go before the GDPR enforcement deadline, it's time for organizations to assess whether "They need to panic a little, or they need to panic a lot."
Download this whitepaper about GDPR readiness that discusses:
The global state of GDPR readiness
The areas where organizations struggle most...

The New York state Department of Financial Services' cybersecurity regulation - 23 NYCRR Part 500 - has been in effect for nearly a year now, and covered entities face some significant compliance milestones in 2018. This regulation puts new demands on financial institutions for security leadership, breach...

The New York state Department of Financial Services' cybersecurity regulation - 23 NYCRR Part 500 - has been in effect for nearly a year now, and covered entities face some significant compliance milestones in 2018. This regulation puts new demands on financial institutions for security leadership, breach...

With roughly six months to go before the GDPR enforcement deadline, Petter Nordwall and Anthony Merry of Sophos says it's time for organizations to assess whether "They need to panic a little, or they need to panic a lot."

Our increased dependence on machines is so profound that even the definition of machine is undergoing radical change. The number and type of physical devices on enterprise networks has been rising rapidly, but this is outstripped by the number of applications and services they host.
At the same time, cloud adoption...

A recently published 2017 survey of over 400 security professionals in the U.S., U.K. and Germany measured how well their organizations implemented security controls for SSH keys. The results show that most organizations are underprepared to protect against SSH-based attacks, with fewer than half following industry...

Take control of your SSH keys to minimize your risk of intrusion
SSH keys provide the highest level of access rights and privileges for servers, applications and virtual instances. Cyber criminals want this trusted status and invest considerable resources into acquiring and using SSH keys in their attacks.
Even...